US20190297153A1 - Geo-locating individuals based on a derived social network - Google Patents

Geo-locating individuals based on a derived social network Download PDF

Info

Publication number
US20190297153A1
US20190297153A1 US16/440,052 US201916440052A US2019297153A1 US 20190297153 A1 US20190297153 A1 US 20190297153A1 US 201916440052 A US201916440052 A US 201916440052A US 2019297153 A1 US2019297153 A1 US 2019297153A1
Authority
US
United States
Prior art keywords
user
venue
location information
information
user location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/440,052
Other versions
US10542105B2 (en
Inventor
Katherine YOSHIDA
Thomas ANNICQ
Roman OBERLI
Jacopo TAGLIABUE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Axon Vibe AG
Original Assignee
Axon Vibe AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Axon Vibe AG filed Critical Axon Vibe AG
Priority to US16/440,052 priority Critical patent/US10542105B2/en
Assigned to Axon Vibe AG reassignment Axon Vibe AG ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: OBERLI, ROMAN, ANNICQ, THOMAS, TAGLIABUE, Jacopo, YOSHIDA, Katherine
Publication of US20190297153A1 publication Critical patent/US20190297153A1/en
Application granted granted Critical
Publication of US10542105B2 publication Critical patent/US10542105B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • H04L67/18
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • H04L67/22
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds

Definitions

  • Embodiments of the present invention generally relate to analyzing user location data, and, in particular, to geo-locating individuals based on a derived social network.
  • a computing device determines a first user location information associated with a first user from a first user device, the first user location information including a first centroid and first radius associated with a first user position. In some embodiments, the computing device receives second user location information associated with a second user from a second user device, the second user location information including a second centroid and second radius associated with a second user position, the second user further associated with second user venue information.
  • the computing device determines a venue correlation score between the first user and the second user based on an amount of overlap between the first user radius and the second user radius and a social metric indicating a strength of a social relationship between the first user and second user, the social relationship being defined at least in part by a number of times and an amount of time a first user is in a proximate location to the second user prior to receiving the first user location information and the second user location information.
  • the computing device creates venue information for the first user based on the second user venue information when the relationship score exceeds a threshold value.
  • the first centroid is associated with a first latitude and longitude
  • the first radius is associated with an accuracy of a location of the first centroid
  • the second centroid is associated with a second latitude and longitude
  • the second radius is associated with an accuracy of a location of the second centroid.
  • the first user information further includes a first user device identifier and a first user duration, the first user duration including a start time and end time corresponding to the first user being associated with the first centroid.
  • the second user information further includes a second user identifier and a second user duration, the second user duration associated with start time and end time corresponding to the second user being associated with the second centroid.
  • the venue correlation score is based on an amount of overlap between the first user duration and the second user duration. In some embodiments, the venue correlation score is further based on a confidence level assigned to the second user venue information. In some embodiments, the social metric is further defined by at least one of a length of a relationship between the first user and the second user; and the relationship being personal or professional. In some embodiments, the threshold value is based on at least one of a received threshold value; a distribution of relationship scores associated with a plurality of users; and an application of a machine learning algorithm to a plurality of user location information and user venue information
  • FIG. 1 is a system diagram showing a networked system, according to some embodiments of the present disclosure.
  • FIG. 2 is a diagram showing a social graph, according to some embodiments of the present disclosure.
  • FIG. 3 is a diagram showing a GPS information associated with a user visit, according to some embodiments of the present disclosure.
  • FIG. 4 is a diagram showing a collection of location information associated with a user visit, according to some embodiments of the present disclosure.
  • FIG. 5 is a diagram showing a collection of venue information associated with a user visit, according to some embodiments of the present disclosure.
  • FIG. 6 is flowchart showing an assignment of venue information for a user, according to some embodiments, of the present disclosure.
  • FIG. 7 is a diagram showing an example of assigning venue information, according to some embodiments of the present disclosure.
  • Techniques are described herein to overcome the constraints of tracking an individual user's location by leveraging a user's derived social network. That is, even if a user has not disclosed her exact location, if the user is co-dwelling with a social connection who has disclosed his location, the user's most likely location can be inferred based on the location of the social connection.
  • the techniques described herein leverage a user's social network and other data sources to make reliable inferences on a user's exact location based on GPS information associated with the user (e.g., generated by their phone).
  • GPS information associated with the user e.g., generated by their phone.
  • an amount of time a user dwells at a particular location also referred to herein as a “visit”
  • a social connection dwells at the same location also informs venue information associated with the user.
  • the systems and methods described herein receive information about two users A and B and information about their dwelling (latitude and longitude, horizontal accuracy, arrival and departure time).
  • the systems and methods described herein determine that A was located at venue V (e.g. Restaurant Mario) (because the user told the system and/or because of strong algorithmic evidence), and can tag B at the same venue by leveraging social connection information between A and B and other contextual information (e.g., temporal and geographic proximity of the users' respective visits, users' own preferences and habits),
  • FIGS. 1 and 2 Various techniques can be used to gather user information and to create a derived social network, for example, as described in FIGS. 1 and 2 below. Additionally, systems and methods for gathering user information to create and to modify a derived social network are described in more detail in U.S. application Ser. No. 15/298,353, titled “System and Method for Detecting Interaction and Influence in Networks,” filed Oct. 20, 2016, the contents of which are incorporated herein.
  • FIG. 1 is a system diagram showing a networked system 100 , according to some embodiments of the present disclosure.
  • FIG. 1 shows a user device 102 , network 104 , server 106 , and a database 108 .
  • a user device 102 can be associated with a user participating in the location tracking systems and methods described herein and can collect information from users participating in the networked system.
  • the user device 102 can include any computerized device capable of recording and transmitting information about a user's proximity to another user or to a location.
  • the computerized device can include a smart phone, tablet, computer, laptop, car, or smart watch that may be installed with a mobile application that facilitates the gathering of data.
  • the user device 102 can include vehicle-mounted data collection agents such auto onboard diagnostics modules, telemetrics and telematics modules, transponders, onboard GPS modules, and other systems that collect relevant data.
  • vehicle-mounted data collection agents such auto onboard diagnostics modules, telemetrics and telematics modules, transponders, onboard GPS modules, and other systems that collect relevant data.
  • user device 102 can include consumer wearable devices or fitness monitors such as the Jawbone Up, Fitbit Charge, or Apple Watch devices.
  • data can be transmitted directly from user device 302 to network 304 (e.g., in the case of the mobile application) or can be collected through an intermediate step.
  • an intermediate module may be utilized to gather information from the onboard device and transmit it over a wireless link to a smartphone where it may then be transmitted to network 304 .
  • a mobile application can be installed on a user's smartphone computing device and provide the user with the ability to opt-in to various data collection mechanisms.
  • a user can permit the system described herein, via the mobile app, to gather the user's contacts, Facebook friends, Instagram friends, position data over time, and payments made using the smartphone computing device, telephone and messaging patterns.
  • a user device 102 can take the form of an application or applets that is provided with various connected devices.
  • an app embedded in a DVR could transmit data concerning viewing habits and preferences
  • software embedded in a car's navigation system could transmit data concerning position and driving patterns.
  • Network 104 enables communication between the user device 102 .
  • Network 104 can be public network such as the Internet, with each of the user device 102 and server 104 connected via a gateway using communication protocols such as Wi-Fi, Ethernet and 4G wireless.
  • network 104 can be a closed network such as a local area network (LAN) with the various components of the relationship analytics system not accessible on the open Internet.
  • communications via network 304 can be encrypted, or additional security protocols me be utilized such as virtual private network (VPN) or secure socket shell (SSH) tunneling.
  • VPN virtual private network
  • SSH secure socket shell
  • Server 106 can include one or more server computers implementing a database 108 for holding the data gathered about the user.
  • a particular configuration of server 106 can depend on a number of factors such as the type of database, the anticipated size of the database, and user performance expectations.
  • the system is scalable and additional processing capacity can be added as demand increases.
  • FIG. 2 is a diagram showing a social graph 200 , according to some embodiments of the present disclosure.
  • the social graph 200 includes nodes 202 204 206 , node parameters 212 214 216 , and links 220 222 224 .
  • a social graph 200 is one way to represent entities and relationship between entities. Other methods of visualizing entities and relationship to entities (e.g., matrix) are equally applicable to the systems and methods described herein.
  • Nodes 202 204 206 represent entities and are each associated with a set of parameters 212 214 216 .
  • the parameters 212 214 216 can be assigned to the nodes 202 204 206 , respectively, based on information received from data collection nodes 110 .
  • the entities can include people, organizations, and devices.
  • the parameters 212 214 216 can include information identifying the entity and describing at least one of a relationship to a location, activity, or transaction associated with the entity. For example, if the entity is as person, the parameters can include an identification number, birthday, gender, employer, credit rating, location (and location accuracy), salary, recent transactions, and recent activities.
  • the node can include properties such as company ID, vendor ID, company name, year of founding, address, industry, industry ranking, credit rating, location information, represented as the latitude and longitude of the company, and an indicator of the confidence in the accuracy of the location coordinates.
  • Company location information can be useful for determining the movement and interaction of individuals.
  • parameter information can be associated with a time that the parameter information is observed, received or processed.
  • transactions can refer to purchases (e.g., clothes, food, travel, merchandise) and activities can refer to events (e.g., sporting events, classes, parties).
  • events e.g., sporting events, classes, parties.
  • a node (e.g., node 202 ) can be connected to other nodes (e.g., node 204 and node 206 ) via links 220 222 224 .
  • the links can represent the strength of relationships between entities or the strengths between parameters associated with the entities.
  • the strength of a relationship between entities can vary depending on the nature of the entities involved and the evidence at hand. In some embodiments and as described in more detail below, smaller scores are considered better and are analogous to distance.
  • a relationship strength value can be referred to as the distance between nodes and measured in units referred to herein as axons.
  • sub-graphs representing the effective reach of an entity are provided. These sub-graphs—known as ego networks—are distance-limited sub-graphs for an entity.
  • ego networks are the basic unit for all further processing. An ego network can be generated using the following guidelines:
  • a maximum traversal distance can be set that restricts the sub-graph to paths that are less than the maximum traversal distance measured in axons.
  • the maximum traversal distance may be set to 100,000 axons, but others settings can be utilized depending on the application.
  • Hop penalties can be applied to the distance for each hop in the path by multiplying the distance by the penalty. For example, if a first hop between nodes has a penalty of 5 and the first hop's distance was 100 axons, it would effectively have a scaled distance of 500 axons.
  • a traversal timeout can be incorporated to restrict large networks that can cause a processing delay.
  • the traversal timeout is a palliative measure that should not be necessary in a well-balanced graph.
  • a traversal timeout may be set to 15 seconds, but variations may be utilized depending on the system.
  • ego network generation can be enforced such as limitations on the network characteristics that are considered during traversal.
  • different social graphs can be created based on a desired commonality factor between entities.
  • the relevant ego networks can be distinctive from each other in this case. For example, in determining an entity's effects on node 202 , link 220 to node 204 may be stronger if the inquiry relates to the entity that will have the most correlation to node 202 in terms of relevant restaurant suggestions in City A, while link 224 to node 206 may be stronger if the inquiry relates to the entity that will have the most correlation to node 202 in terms of relevant retailer for casual clothing.
  • information associated with users' visits to various locations (and possibly venues) table can be used to compute the similarity between every pair of users. If two users are found to be similar enough, they can become an entity in the overall connection graph. For every connection, there are two nodes (e.g., 202 and 204 ) representing each of the two users—and a weight (or score) (e.g., 220 ), which is a real number between 0 and 1 indicating the strength of the connection between the two nodes.
  • a weight or score
  • the confidence level associated with the presence of a social connection between the users increases accordingly. Closer connections will often spend more time together, in diverse locations (e.g., not just at work, but also at the bar after work, and at one user's home together on the weekend). More distant connections will often spend relatively less time together, in less varied locations.
  • a commonality factor can be determined for an entity based on a changed parameter for the entity. For example, when an entity travels to a new location, a social graph can be created based on factors that are relevant to traveling to a new place (e.g., hotel, rental car, restaurants). As another example, the changed parameter can include a particular purchase or a noticed pattern of purchases. In some embodiments, changed parameters can determine an entity's familiarity with an area. The social graph can look very different in an entity's home town than in a place the entity has never visited before. For example, a hotel can have a different relevance value in an entity's home town than it does in a new place that the entity is visiting (a place with less familiarity). In some embodiments, changed parameter information includes both a location and time associated with the changed parameter.
  • a scoring relationship strength can vary depending on the nature of the entities involved and the information available. For example, a relationship between two individuals may be assessed using metrics such as the length of that relationship, whether the relationship is personal or professional, how often two individuals are in the same location, and how often the individuals visit similar locations, among others. Similarly, the relationship between an individual and a particular brand may include how long the individual has been purchasing that brand, how often the individual purchases competing brands, and how often one product is purchased at the same time as another product, among others. While there may be overlap among relationship characteristics depending on the type, there may also be differences.
  • a score can be assessed in axons, which was mentioned briefly above. Smaller scores are considered better, and are analogous to distance.
  • the centrality of an entity can also be scored to quantify the entity's connectedness within the network, which in turn measures the influence of that entity.
  • weighted interconnections that score the relationships based upon the characteristics of the relationships.
  • characteristics include duration, vintage, interaction, trust/variety, control, and harmony. Additional details describing the calculation of weights for connections between two users can be found in U.S. application Ser. No. 15/298,353, titled “System and Method for Detecting Interaction and Influence in Networks,” filed Oct. 20, 2016, the contents of which are incorporated herein.
  • FIG. 3 is a diagram showing a GPS information associated with a user visit, according to some embodiments of the present disclosure.
  • FIG. 3 shows a centroid 300 , and a centroid radius 301 .
  • a “visit” is a GPS pair (lat, lon) with a start and end time (e.g. “2016/28/11 10:30:00+00:00”) generated by a particular user device (e.g. mobile phone).
  • the visit can be represented in space with a circle: a centroid 300 is where the visit is recorded by the device and the radius 301 depicts the horizontal accuracy of that recording, as judged by the device. Generally, the bigger the radius, the less confidence there is about the position of the user.
  • FIG. 4 is a diagram showing a collection of location information associated with a user visit, according to some embodiments of the present disclosure.
  • FIG. 4 shows a visit object 402 , database 404 , a user data table 406 , visit ID 410 , and device ID 412 .
  • Visit object 402 is uploaded from user device 102 to server 106 .
  • Visit object 402 includes location information for the user including centroid, accuracy, start and end time.
  • the format of the visit object can be any format agreed upon by the user device 102 and server 106 , for example in JSON format as illustrated below:
  • Server 106 can persist visit object 402 information in a database 108 for further analysis.
  • the information in the database 108 can be organized in a visit data table 404 that assigns to each object a visit ID 410 and device ID 412 in the table 404 .
  • Any data structure that stores the association between IDs and the object can be used, for example, an integer table as shown below:
  • the visit ID 410 can be used to correlate a venue with the user.
  • FIG. 5 is a diagram showing a collection of venue information associated with a user visit, according to some embodiments of the present disclosure.
  • FIG. 5 shows venue data 502 and venue ID 504 stored in data table 501 .
  • Venue data 502 corresponds to venue information associated with a user's location.
  • venue data 502 is obtained via a “check-in.”
  • a “check-in,” as used herein, refers to an action that is performed voluntarily by a user of the user device 102 confirming that a visit should be tagged with a venue (e.g., Restaurant Mario).
  • Venues can be provided to an application running on the user device 102 from a table of venues. Other venue confirmation procedures that map a visit to a venue can also be used (e.g., credit card transaction, strong algorithmic evidence from other software applications).
  • the venue information can be tagged with a venue ID 504 , for example, a shown below:
  • Venue data 502 which has been confirmed, can be uploaded as an object mapping the visit ID 410 with a venue ID 504 .
  • a venue ID 504 can correspond to a unique ID assigned to a venue.
  • the venue data 502 object can be of any format agreed upon by the user device 102 and server 106 , for example in JSON format as illustrated below:
  • the venue ID 504 can be stored in the database in a manner that correlates the visit ID 111 with the venue ID 504 .
  • an integer table can be used as shown below:
  • FIG. 6 is flowchart showing an assignment of venue information for a user, according to some embodiments, of the present disclosure.
  • first user location information is received, the first user location information including a centroid and radius associated with the first user position.
  • location information can include a user location (e.g., expressed as a centroid using longitude and latitude), a duration associated with a user being present at the location (e.g., measured by a start time and end time), and a confidence level of the user being at the location (e.g., measured by a radius associated with the centroid).
  • second user location information is received, the second user location information including a centroid and radius associated with the second user position and venue information associated with the second user.
  • location information can include a user location (e.g., expressed as a centroid using longitude and latitude), a duration associated with a user being present at the location (e.g., measured by a start time and end time), and a confidence level of the user being at the location (e.g., measured by a radius associated with the centroid).
  • the server receives information related to the particular venue the second user is at.
  • a venue can be a location (lat, lon pair) augmented with semantic meta-data: e.g., category (restaurant, hotel, stadium, etc.), name, hours of operations etc.
  • “check-in” information is also associated with a confidence level regarding the reliability of the matching between the dwell and the venue in question. Factors that contribute to the reliability include user confirmation of the venue (e.g., a manual check-in by a user regarding the venue), third-party verification of the venue (e.g., purchases made by a user at a venue) and other algorithmic evidence.
  • a relationship score is determined between the first user and the second user based on an amount of overlap between a first user radius and a second user radius and a social metric indicating a strength of a social relationship between the first and second user.
  • a social metric indicating a strength of a social relationship between the first and second user.
  • the threshold can be chosen to be relatively small, for example to gather more user data (e.g., to trigger more user confirmation and improve user engagement with the software application), while in other embodiments the threshold can be set to higher as to minimize the number of false positives (for example, in highly sensitive data application, one may prefer to make less inferences but also less mistakes).
  • venue information is created for the first user based on venue information associated with the second user when the venue correlation score exceeds a threshold. For example, assume the following scenario:
  • the value of the features in the decision-making algorithm can be calculated that can perform venue matching for USER 2 if conditions are met, for example:
  • the algorithm making the final decision can be different in different embodiments: for example, the three features can be multiplied and a threshold heuristically set based on domain-specific knowledge (similar to the IF-THEN relationship illustrated above); or, as another example, the distribution of these scores can be estimated and the threshold decided as the value marking the nth percentile (i.e. the value making n % of scores as not strong enough to allow venue-matching).
  • a machine learning algorithm suitable for a decision problem can be used (e.g. logistic regression, decision tree) to learn the optimal way to make the final venue-matching decision based on spatio-temporal features and the social connection.
  • FIG. 7 is a diagram showing an example of assigning venue information, according to some embodiments of the present disclosure.
  • FIG. 7 shows a spatial overlap map 700 , user A centroid 701 , user B centroid 702 , user A visit object 703 and user B visit object 704 .
  • User A is a user having already having a confirmed venue
  • user B is a user being assigned a venue based on the systems and methods described herein.
  • spatial overlap map 700 user A centroid 701 and user B centroid 702 are very close and the horizontal (radial) components of each centroid overlap. Even though user A centroid 701 and user B centroid 702 do not match exactly (e.g., the GPS signals (the visits) generated by their devices are slightly displaced), there is a chance the two users are in the same venue.
  • User A visit object 703 and user B visit object 704 include location information.
  • the location information includes device ID, latitude, longitude, hAccuracy (horizontal accuracy in latitude/longitude, as opposed to vertical accuracy in altitude), start time and end time.
  • the time at which user A and user B are found at the locations shown in space overlap map 700 overlaps (e.g., start time and end time for user A is 10:30 and 12:32 while the start time and end time for user B is 10:21 and 12:43). That is, user B's visit begins just a few minutes before and ends just a few minutes after the user A's visit. Generally, the more closely users' visit times match, the more likely they are to be together.
  • User A visit object 703 further includes venue ID information, while user B visit object 704 does not include venue ID information.
  • venue ID information can be assigned when a confidence level regarding the reliability of the venue information exceeds a threshold.
  • Factors that contribute to the reliability of the venue information include user confirmation of the venue (e.g., a manual check-in by a user regarding the venue) and third-party verification of the venue (e.g., purchases made by a user at a venue).
  • user A visit object 703 has venue information because the system determined that user A had reliable venue information.
  • User B can be assigned the venue information of user A based on the strength of the correlation between their location information and their social connection information. As described, the systems and methods described herein can consider the strength of the social connections between A and B as described above in FIG. 2 and in U.S. application Ser. No. 15/298,353, titled “System and Method for Detecting Interaction and Influence in Networks,” filed Oct. 20, 2016, the contents of which are incorporated herein. Assuming user A and user B are close social connections (e.g., have a score of 0.96) and the location information overlap is significant (exceeds a confidence threshold), the venue ID of user A can either be assigned or suggested to user B.
  • the subject matter described herein can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structural means disclosed in this specification and structural equivalents thereof, or in combinations of them.
  • the subject matter described herein can be implemented as one or more computer program products, such as one or more computer programs tangibly embodied in an information carrier (e.g., in a machine readable storage device), or embodied in a propagated signal, for execution by, or to control the operation of, data processing apparatus (e.g., a programmable processor, a computer, or multiple computers).
  • a computer program (also known as a program, software, software application, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
  • a computer program does not necessarily correspond to a file.
  • a program can be stored in a portion of a file that holds other programs or data, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
  • a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
  • processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processor of any kind of digital computer.
  • a processor will receive instructions and data from a read only memory or a random access memory or both.
  • the essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data.
  • a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks.
  • Information carriers suitable for embodying computer program instructions and data include all forms of nonvolatile memory, including by way of example semiconductor memory devices, (e.g., EPROM, EEPROM, and flash memory devices); magnetic disks, (e.g., internal hard disks or removable disks); magneto optical disks; and optical disks (e.g., CD and DVD disks).
  • semiconductor memory devices e.g., EPROM, EEPROM, and flash memory devices
  • magnetic disks e.g., internal hard disks or removable disks
  • magneto optical disks e.g., CD and DVD disks
  • optical disks e.g., CD and DVD disks.
  • the processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
  • the subject matter described herein can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, (e.g., a mouse or a trackball), by which the user can provide input to the computer.
  • a display device e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
  • a keyboard and a pointing device e.g., a mouse or a trackball
  • Other kinds of devices can be used to provide for interaction with a user as well.
  • feedback provided to the user can be any form of sensory feedback, (e.g., visual feedback, auditory feedback, or tactile feedback), and input from the user can be received in any form, including acoustic, speech, or tactile input.
  • the subject matter described herein can be implemented in a computing system that includes a back end component (e.g., a data server), a middleware component (e.g., an application server), or a front end component (e.g., a client computer having a graphical user interface or a web browser through which a user can interact with an implementation of the subject matter described herein), or any combination of such back end, middleware, and front end components.
  • the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet.
  • LAN local area network
  • WAN wide area network

Abstract

Techniques for determining a location of a user based on locations of other users. First user location information and second user location information is received. The first user location information includes a first centroid and first radius associated with a first user position and the second user location information includes a second centroid and second radius associated with a second user position. The second user is further associated with second user venue information. A venue correlation score between the first user and the second user is determined based on an amount of overlap between the first user radius and the second user radius and a social metric indicating a strength of a social relationship between the first user and second user. Venue information for the first user is created based on the second user venue information when the relationship score exceeds a threshold value.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 16/224,094, filed on Dec. 18, 2018, which is a continuation of U.S. patent application Ser. No. 15/674,778, filed on Aug. 11, 2017, and issued as U.S. Pat. No. 10,264,080 on Apr. 16, 2019, which claims priority to U.S. Provisional Application No. 62/373,664, filed Aug. 11, 2016, the contents of each of which are incorporated herein by reference.
  • TECHNICAL FIELD
  • Embodiments of the present invention generally relate to analyzing user location data, and, in particular, to geo-locating individuals based on a derived social network.
  • BACKGROUND
  • Despite the ability of mobile phones to record a user's geo-location (latitude, longitude) at points in time, it remains a challenge to pinpoint the venue at which an individual has dwelled. This is because location points are often lacking both in density and in accuracy.
  • Mobile phones often record location sparingly due to battery constraints (frequent location points will drain the phone's battery). When they are recorded, the points are not always accurate, often containing a significant amount of uncertainty (e.g., 100 meter radius). This uncertainty is compounded in densely populated urban areas, where there may exist many venues within the uncertainty radius. Therefore, it is still difficult to know at which venue the user is actually dwelling.
  • SUMMARY OF THE INVENTION
  • Systems and methods are disclosed for determining a location of a user based on locations of other users. In some embodiments, a computing device determines a first user location information associated with a first user from a first user device, the first user location information including a first centroid and first radius associated with a first user position. In some embodiments, the computing device receives second user location information associated with a second user from a second user device, the second user location information including a second centroid and second radius associated with a second user position, the second user further associated with second user venue information. In some embodiments, the computing device determines a venue correlation score between the first user and the second user based on an amount of overlap between the first user radius and the second user radius and a social metric indicating a strength of a social relationship between the first user and second user, the social relationship being defined at least in part by a number of times and an amount of time a first user is in a proximate location to the second user prior to receiving the first user location information and the second user location information. In some embodiments, the computing device, creates venue information for the first user based on the second user venue information when the relationship score exceeds a threshold value.
  • In some embodiments, the first centroid is associated with a first latitude and longitude, the first radius is associated with an accuracy of a location of the first centroid, the second centroid is associated with a second latitude and longitude, the second radius is associated with an accuracy of a location of the second centroid. In some embodiments, the first user information further includes a first user device identifier and a first user duration, the first user duration including a start time and end time corresponding to the first user being associated with the first centroid. In some embodiments, the second user information further includes a second user identifier and a second user duration, the second user duration associated with start time and end time corresponding to the second user being associated with the second centroid. In some embodiments, the venue correlation score is based on an amount of overlap between the first user duration and the second user duration. In some embodiments, the venue correlation score is further based on a confidence level assigned to the second user venue information. In some embodiments, the social metric is further defined by at least one of a length of a relationship between the first user and the second user; and the relationship being personal or professional. In some embodiments, the threshold value is based on at least one of a received threshold value; a distribution of relationship scores associated with a plurality of users; and an application of a machine learning algorithm to a plurality of user location information and user venue information
  • These and other capabilities of the disclosed subject matter will be more fully understood after a review of the following figures, detailed description, and claims. It is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
  • BRIEF DESCRIPTION OF FIGURES
  • Various objectives, features, and advantages of the disclosed subject matter can be more fully appreciated with reference to the following detailed description of the disclosed subject matter when considered in connection with the following drawings, in which like reference numerals identify like elements.
  • FIG. 1 is a system diagram showing a networked system, according to some embodiments of the present disclosure.
  • FIG. 2 is a diagram showing a social graph, according to some embodiments of the present disclosure.
  • FIG. 3 is a diagram showing a GPS information associated with a user visit, according to some embodiments of the present disclosure.
  • FIG. 4 is a diagram showing a collection of location information associated with a user visit, according to some embodiments of the present disclosure.
  • FIG. 5 is a diagram showing a collection of venue information associated with a user visit, according to some embodiments of the present disclosure.
  • FIG. 6 is flowchart showing an assignment of venue information for a user, according to some embodiments, of the present disclosure.
  • FIG. 7 is a diagram showing an example of assigning venue information, according to some embodiments of the present disclosure.
  • DETAILED DESCRIPTION
  • Techniques are described herein to overcome the constraints of tracking an individual user's location by leveraging a user's derived social network. That is, even if a user has not disclosed her exact location, if the user is co-dwelling with a social connection who has disclosed his location, the user's most likely location can be inferred based on the location of the social connection.
  • In some embodiments, the techniques described herein leverage a user's social network and other data sources to make reliable inferences on a user's exact location based on GPS information associated with the user (e.g., generated by their phone). In some embodiments, an amount of time a user dwells at a particular location (also referred to herein as a “visit”) with reference to an amount of time a social connection dwells at the same location also informs venue information associated with the user.
  • In some embodiments, the systems and methods described herein receive information about two users A and B and information about their dwelling (latitude and longitude, horizontal accuracy, arrival and departure time). The systems and methods described herein determine that A was located at venue V (e.g. Restaurant Mario) (because the user told the system and/or because of strong algorithmic evidence), and can tag B at the same venue by leveraging social connection information between A and B and other contextual information (e.g., temporal and geographic proximity of the users' respective visits, users' own preferences and habits),
  • Various techniques can be used to gather user information and to create a derived social network, for example, as described in FIGS. 1 and 2 below. Additionally, systems and methods for gathering user information to create and to modify a derived social network are described in more detail in U.S. application Ser. No. 15/298,353, titled “System and Method for Detecting Interaction and Influence in Networks,” filed Oct. 20, 2016, the contents of which are incorporated herein.
  • FIG. 1 is a system diagram showing a networked system 100, according to some embodiments of the present disclosure. FIG. 1 shows a user device 102, network 104, server 106, and a database 108.
  • A user device 102 can be associated with a user participating in the location tracking systems and methods described herein and can collect information from users participating in the networked system. In some embodiments, the user device 102 can include any computerized device capable of recording and transmitting information about a user's proximity to another user or to a location. In some embodiments, the computerized device can include a smart phone, tablet, computer, laptop, car, or smart watch that may be installed with a mobile application that facilitates the gathering of data.
  • In some embodiments, the user device 102 can include vehicle-mounted data collection agents such auto onboard diagnostics modules, telemetrics and telematics modules, transponders, onboard GPS modules, and other systems that collect relevant data.
  • In some embodiments, user device 102 can include consumer wearable devices or fitness monitors such as the Jawbone Up, Fitbit Charge, or Apple Watch devices.
  • In some embodiments, data can be transmitted directly from user device 302 to network 304 (e.g., in the case of the mobile application) or can be collected through an intermediate step. For example, in the case of a vehicle telemetrics system, an intermediate module may be utilized to gather information from the onboard device and transmit it over a wireless link to a smartphone where it may then be transmitted to network 304.
  • In some embodiments, a mobile application can be installed on a user's smartphone computing device and provide the user with the ability to opt-in to various data collection mechanisms. For example, a user can permit the system described herein, via the mobile app, to gather the user's contacts, Facebook friends, Instagram friends, position data over time, and payments made using the smartphone computing device, telephone and messaging patterns.
  • In some embodiments, a user device 102 can take the form of an application or applets that is provided with various connected devices. For example, an app embedded in a DVR could transmit data concerning viewing habits and preferences, while software embedded in a car's navigation system could transmit data concerning position and driving patterns.
  • It will be appreciated by those of skill in the art that there is no limit to the type and variety of user devices that can be utilized with systems described in the present disclosure.
  • Network 104 enables communication between the user device 102. Network 104 can be public network such as the Internet, with each of the user device 102 and server 104 connected via a gateway using communication protocols such as Wi-Fi, Ethernet and 4G wireless. Alternatively, network 104 can be a closed network such as a local area network (LAN) with the various components of the relationship analytics system not accessible on the open Internet. In some embodiments, communications via network 304 can be encrypted, or additional security protocols me be utilized such as virtual private network (VPN) or secure socket shell (SSH) tunneling.
  • Server 106 can include one or more server computers implementing a database 108 for holding the data gathered about the user. In some embodiments, a particular configuration of server 106 can depend on a number of factors such as the type of database, the anticipated size of the database, and user performance expectations. In some embodiments, the system is scalable and additional processing capacity can be added as demand increases.
  • FIG. 2 is a diagram showing a social graph 200, according to some embodiments of the present disclosure. The social graph 200 includes nodes 202 204 206, node parameters 212 214 216, and links 220 222 224.
  • As described above, a social graph 200 is one way to represent entities and relationship between entities. Other methods of visualizing entities and relationship to entities (e.g., matrix) are equally applicable to the systems and methods described herein.
  • Nodes 202 204 206 represent entities and are each associated with a set of parameters 212 214 216. As described above, the parameters 212 214 216 can be assigned to the nodes 202 204 206, respectively, based on information received from data collection nodes 110. The entities can include people, organizations, and devices. The parameters 212 214 216 can include information identifying the entity and describing at least one of a relationship to a location, activity, or transaction associated with the entity. For example, if the entity is as person, the parameters can include an identification number, birthday, gender, employer, credit rating, location (and location accuracy), salary, recent transactions, and recent activities. As another example, if the entity is a company, the node can include properties such as company ID, vendor ID, company name, year of founding, address, industry, industry ranking, credit rating, location information, represented as the latitude and longitude of the company, and an indicator of the confidence in the accuracy of the location coordinates. Company location information can be useful for determining the movement and interaction of individuals. In some embodiments, parameter information can be associated with a time that the parameter information is observed, received or processed.
  • As used herein, transactions can refer to purchases (e.g., clothes, food, travel, merchandise) and activities can refer to events (e.g., sporting events, classes, parties).
  • A node (e.g., node 202) can be connected to other nodes (e.g., node 204 and node 206) via links 220 222 224. The links can represent the strength of relationships between entities or the strengths between parameters associated with the entities. The strength of a relationship between entities can vary depending on the nature of the entities involved and the evidence at hand. In some embodiments and as described in more detail below, smaller scores are considered better and are analogous to distance. A relationship strength value can be referred to as the distance between nodes and measured in units referred to herein as axons.
  • In embodiments, sub-graphs representing the effective reach of an entity are provided. These sub-graphs—known as ego networks—are distance-limited sub-graphs for an entity. In embodiments, once the social graph has been created, ego networks are the basic unit for all further processing. An ego network can be generated using the following guidelines:
  • A maximum traversal distance can be set that restricts the sub-graph to paths that are less than the maximum traversal distance measured in axons. In some embodiments, the maximum traversal distance may be set to 100,000 axons, but others settings can be utilized depending on the application.
  • Hop penalties can be applied to the distance for each hop in the path by multiplying the distance by the penalty. For example, if a first hop between nodes has a penalty of 5 and the first hop's distance was 100 axons, it would effectively have a scaled distance of 500 axons.
  • A traversal timeout can be incorporated to restrict large networks that can cause a processing delay. The traversal timeout is a palliative measure that should not be necessary in a well-balanced graph. In some embodiments, a traversal timeout may be set to 15 seconds, but variations may be utilized depending on the system.
  • Depending on whether the root of the ego network is an individual or an entity, additional restrictions on ego network generation can be enforced such as limitations on the network characteristics that are considered during traversal.
  • In some embodiments, different social graphs can be created based on a desired commonality factor between entities. The relevant ego networks can be distinctive from each other in this case. For example, in determining an entity's effects on node 202, link 220 to node 204 may be stronger if the inquiry relates to the entity that will have the most correlation to node 202 in terms of relevant restaurant suggestions in City A, while link 224 to node 206 may be stronger if the inquiry relates to the entity that will have the most correlation to node 202 in terms of relevant retailer for casual clothing.
  • In some embodiments, and as described in more detail below, information associated with users' visits to various locations (and possibly venues) table can be used to compute the similarity between every pair of users. If two users are found to be similar enough, they can become an entity in the overall connection graph. For every connection, there are two nodes (e.g., 202 and 204) representing each of the two users—and a weight (or score) (e.g., 220), which is a real number between 0 and 1 indicating the strength of the connection between the two nodes.
  • In some embodiments, when two users spend a relatively high proportion of time in close proximity, the confidence level associated with the presence of a social connection between the users increases accordingly. Closer connections will often spend more time together, in diverse locations (e.g., not just at work, but also at the bar after work, and at one user's home together on the weekend). More distant connections will often spend relatively less time together, in less varied locations.
  • A commonality factor can be determined for an entity based on a changed parameter for the entity. For example, when an entity travels to a new location, a social graph can be created based on factors that are relevant to traveling to a new place (e.g., hotel, rental car, restaurants). As another example, the changed parameter can include a particular purchase or a noticed pattern of purchases. In some embodiments, changed parameters can determine an entity's familiarity with an area. The social graph can look very different in an entity's home town than in a place the entity has never visited before. For example, a hotel can have a different relevance value in an entity's home town than it does in a new place that the entity is visiting (a place with less familiarity). In some embodiments, changed parameter information includes both a location and time associated with the changed parameter.
  • In some embodiments, a scoring relationship strength can vary depending on the nature of the entities involved and the information available. For example, a relationship between two individuals may be assessed using metrics such as the length of that relationship, whether the relationship is personal or professional, how often two individuals are in the same location, and how often the individuals visit similar locations, among others. Similarly, the relationship between an individual and a particular brand may include how long the individual has been purchasing that brand, how often the individual purchases competing brands, and how often one product is purchased at the same time as another product, among others. While there may be overlap among relationship characteristics depending on the type, there may also be differences.
  • In measuring the strength of a relationship a score can be assessed in axons, which was mentioned briefly above. Smaller scores are considered better, and are analogous to distance. In addition to scoring relationships, the centrality of an entity can also be scored to quantify the entity's connectedness within the network, which in turn measures the influence of that entity.
  • Individual relationships may be represented using weighted interconnections that score the relationships based upon the characteristics of the relationships. In embodiments, characteristics include duration, vintage, interaction, trust/variety, control, and harmony. Additional details describing the calculation of weights for connections between two users can be found in U.S. application Ser. No. 15/298,353, titled “System and Method for Detecting Interaction and Influence in Networks,” filed Oct. 20, 2016, the contents of which are incorporated herein.
  • FIG. 3 is a diagram showing a GPS information associated with a user visit, according to some embodiments of the present disclosure. FIG. 3 shows a centroid 300, and a centroid radius 301.
  • In some embodiments, a “visit” is a GPS pair (lat, lon) with a start and end time (e.g. “2016/28/11 10:30:00+00:00”) generated by a particular user device (e.g. mobile phone). The visit can be represented in space with a circle: a centroid 300 is where the visit is recorded by the device and the radius 301 depicts the horizontal accuracy of that recording, as judged by the device. Generally, the bigger the radius, the less confidence there is about the position of the user.
  • FIG. 4 is a diagram showing a collection of location information associated with a user visit, according to some embodiments of the present disclosure. FIG. 4 shows a visit object 402, database 404, a user data table 406, visit ID 410, and device ID 412.
  • Visit object 402 is uploaded from user device 102 to server 106. Visit object 402 includes location information for the user including centroid, accuracy, start and end time. The format of the visit object can be any format agreed upon by the user device 102 and server 106, for example in JSON format as illustrated below:
  • {
    “deviceId”: AAAABBBB,
    “lat”: 40.706134,
    “lon”: −74.013672,
    “hAccuracy”: 100,
    “startTime”: “2016/11/28 10:30:00+00:00”,
    “endTime”: “2016/11/28 12:32:00+00:00”
    }
  • Server 106 can persist visit object 402 information in a database 108 for further analysis. The information in the database 108 can be organized in a visit data table 404 that assigns to each object a visit ID 410 and device ID 412 in the table 404. Any data structure that stores the association between IDs and the object can be used, for example, an integer table as shown below:
  • Visit Id Device Id
    111 AAAABBBB
    222 CCCCDDDD
    . . . . . .
  • As described in more detail below in the text accompanying FIG. 5, the visit ID 410 can be used to correlate a venue with the user.
  • FIG. 5 is a diagram showing a collection of venue information associated with a user visit, according to some embodiments of the present disclosure. FIG. 5 shows venue data 502 and venue ID 504 stored in data table 501.
  • Venue data 502 corresponds to venue information associated with a user's location. In some embodiment, venue data 502 is obtained via a “check-in.” A “check-in,” as used herein, refers to an action that is performed voluntarily by a user of the user device 102 confirming that a visit should be tagged with a venue (e.g., Restaurant Mario). Venues can be provided to an application running on the user device 102 from a table of venues. Other venue confirmation procedures that map a visit to a venue can also be used (e.g., credit card transaction, strong algorithmic evidence from other software applications). The venue information can be tagged with a venue ID 504, for example, a shown below:
  • Venue Id Name
    2222 Bar X
    3333 Restaurant Y
    . . . . . .
  • Venue data 502, which has been confirmed, can be uploaded as an object mapping the visit ID 410 with a venue ID 504. A venue ID 504 can correspond to a unique ID assigned to a venue. The venue data 502 object can be of any format agreed upon by the user device 102 and server 106, for example in JSON format as illustrated below:
  • {
    “visitId”: 111
    “venueId”: 2222
    }
  • The venue ID 504 can be stored in the database in a manner that correlates the visit ID 111 with the venue ID 504. For example, an integer table can be used as shown below:
  • Visit Id Device Id Venue ID
    111 AAAABBBB 2222
    222 CCCCDDDD . . .
    . . . . . . . . .
  • FIG. 6 is flowchart showing an assignment of venue information for a user, according to some embodiments, of the present disclosure.
  • Referring to step 602, first user location information is received, the first user location information including a centroid and radius associated with the first user position. As described above, location information can include a user location (e.g., expressed as a centroid using longitude and latitude), a duration associated with a user being present at the location (e.g., measured by a start time and end time), and a confidence level of the user being at the location (e.g., measured by a radius associated with the centroid).
  • Referring to step 604, second user location information is received, the second user location information including a centroid and radius associated with the second user position and venue information associated with the second user. As described above, location information can include a user location (e.g., expressed as a centroid using longitude and latitude), a duration associated with a user being present at the location (e.g., measured by a start time and end time), and a confidence level of the user being at the location (e.g., measured by a radius associated with the centroid).
  • Also as described above, the server receives information related to the particular venue the second user is at. A venue can be a location (lat, lon pair) augmented with semantic meta-data: e.g., category (restaurant, hotel, stadium, etc.), name, hours of operations etc. In some embodiments, “check-in” information is also associated with a confidence level regarding the reliability of the matching between the dwell and the venue in question. Factors that contribute to the reliability include user confirmation of the venue (e.g., a manual check-in by a user regarding the venue), third-party verification of the venue (e.g., purchases made by a user at a venue) and other algorithmic evidence.
  • Referring to step 606, a relationship score is determined between the first user and the second user based on an amount of overlap between a first user radius and a second user radius and a social metric indicating a strength of a social relationship between the first and second user. Note that the following is only an example of such an algorithm, which can take various forms (e.g., threshold decision, probabilistic decision trees, etc.) is:
      • temporal overlap metric*spatial overlap metric*social connection metric>threshold→user2 will be assigned user1 venue information
  • In some embodiments the threshold can be chosen to be relatively small, for example to gather more user data (e.g., to trigger more user confirmation and improve user engagement with the software application), while in other embodiments the threshold can be set to higher as to minimize the number of false positives (for example, in highly sensitive data application, one may prefer to make less inferences but also less mistakes).
  • Referring to step 608, venue information is created for the first user based on venue information associated with the second user when the venue correlation score exceeds a threshold. For example, assume the following scenario:
      • USER 1, visit centered at <40.708793, −74.011013>, from 09:10 to 09:45
      • USER 2, visit centered at <40.708616, −74.011145>, from 09:12 to 09:48
      • USER 1 confirms the visit at Starbucks located at 115 Broadway (10006, New York).
  • For the two users, the value of the features in the decision-making algorithm can be calculated that can perform venue matching for USER 2 if conditions are met, for example:
      • Temporal overlap metric: 33/38=0.86 (overlap in time as measured as a Jaccard distance between the set of minutes in the two intervals)
      • Spatial overlap metric: 1−0.044=0.956 (the distance between the two visits (point-to-point) is 0.022 km, scaled to a theoretical maximum of 0.5 km)
      • Social connection metric: 0.75 (property read from the social graph, assuming they are close friends)
  • Each of the features noted above can be calculated in different ways (e.g.: horizontal accuracy could be used explicitly in the spatial overlap). Moreover, the algorithm making the final decision can be different in different embodiments: for example, the three features can be multiplied and a threshold heuristically set based on domain-specific knowledge (similar to the IF-THEN relationship illustrated above); or, as another example, the distribution of these scores can be estimated and the threshold decided as the value marking the nth percentile (i.e. the value making n % of scores as not strong enough to allow venue-matching). Finally, with enough training data, a machine learning algorithm suitable for a decision problem can be used (e.g. logistic regression, decision tree) to learn the optimal way to make the final venue-matching decision based on spatio-temporal features and the social connection.
  • FIG. 7 is a diagram showing an example of assigning venue information, according to some embodiments of the present disclosure. FIG. 7 shows a spatial overlap map 700, user A centroid 701, user B centroid 702, user A visit object 703 and user B visit object 704.
  • User A, as referred to with reference to FIG. 7, is a user having already having a confirmed venue, while user B is a user being assigned a venue based on the systems and methods described herein. As shown in spatial overlap map 700, user A centroid 701 and user B centroid 702 are very close and the horizontal (radial) components of each centroid overlap. Even though user A centroid 701 and user B centroid 702 do not match exactly (e.g., the GPS signals (the visits) generated by their devices are slightly displaced), there is a chance the two users are in the same venue.
  • User A visit object 703 and user B visit object 704 include location information. The location information includes device ID, latitude, longitude, hAccuracy (horizontal accuracy in latitude/longitude, as opposed to vertical accuracy in altitude), start time and end time. As shown in FIG. 7, the time at which user A and user B are found at the locations shown in space overlap map 700 overlaps (e.g., start time and end time for user A is 10:30 and 12:32 while the start time and end time for user B is 10:21 and 12:43). That is, user B's visit begins just a few minutes before and ends just a few minutes after the user A's visit. Generally, the more closely users' visit times match, the more likely they are to be together.
  • User A visit object 703 further includes venue ID information, while user B visit object 704 does not include venue ID information. As described above, venue ID information can be assigned when a confidence level regarding the reliability of the venue information exceeds a threshold. Factors that contribute to the reliability of the venue information include user confirmation of the venue (e.g., a manual check-in by a user regarding the venue) and third-party verification of the venue (e.g., purchases made by a user at a venue). In this example, user A visit object 703 has venue information because the system determined that user A had reliable venue information.
  • User B can be assigned the venue information of user A based on the strength of the correlation between their location information and their social connection information. As described, the systems and methods described herein can consider the strength of the social connections between A and B as described above in FIG. 2 and in U.S. application Ser. No. 15/298,353, titled “System and Method for Detecting Interaction and Influence in Networks,” filed Oct. 20, 2016, the contents of which are incorporated herein. Assuming user A and user B are close social connections (e.g., have a score of 0.96) and the location information overlap is significant (exceeds a confidence threshold), the venue ID of user A can either be assigned or suggested to user B.
  • As another example, assume a group of users all go to a restaurant together. Their mobile location points are displaced, making it appear that they are most likely at another venue across the street; moreover, there are several possible venues within the location points' radii of uncertainty. However, one user discloses her location (e.g., paying for the bill with a credit card or tagging a photo with a venue), thus confirming her presence at that specific restaurant. The system described herein can determine the first user is closely geo-located to other individuals with whom she has strong social ties and can extrapolate that the other individuals are at that same location.
  • The subject matter described herein can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structural means disclosed in this specification and structural equivalents thereof, or in combinations of them. The subject matter described herein can be implemented as one or more computer program products, such as one or more computer programs tangibly embodied in an information carrier (e.g., in a machine readable storage device), or embodied in a propagated signal, for execution by, or to control the operation of, data processing apparatus (e.g., a programmable processor, a computer, or multiple computers). A computer program (also known as a program, software, software application, or code) can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program does not necessarily correspond to a file. A program can be stored in a portion of a file that holds other programs or data, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
  • The processes and logic flows described in this specification, including the method steps of the subject matter described herein, can be performed by one or more programmable processors executing one or more computer programs to perform functions of the subject matter described herein by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus of the subject matter described herein can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
  • Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processor of any kind of digital computer. Generally, a processor will receive instructions and data from a read only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of nonvolatile memory, including by way of example semiconductor memory devices, (e.g., EPROM, EEPROM, and flash memory devices); magnetic disks, (e.g., internal hard disks or removable disks); magneto optical disks; and optical disks (e.g., CD and DVD disks). The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
  • To provide for interaction with a user, the subject matter described herein can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, (e.g., a mouse or a trackball), by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well. For example, feedback provided to the user can be any form of sensory feedback, (e.g., visual feedback, auditory feedback, or tactile feedback), and input from the user can be received in any form, including acoustic, speech, or tactile input.
  • The subject matter described herein can be implemented in a computing system that includes a back end component (e.g., a data server), a middleware component (e.g., an application server), or a front end component (e.g., a client computer having a graphical user interface or a web browser through which a user can interact with an implementation of the subject matter described herein), or any combination of such back end, middleware, and front end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet.
  • It is to be understood that the disclosed subject matter is not limited in its application to the details of construction and to the arrangements of the components set forth in the following description or illustrated in the drawings. The disclosed subject matter is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.
  • As such, those skilled in the art will appreciate that the conception, upon which this disclosure is based, may readily be utilized as a basis for the designing of other structures, methods, and systems for carrying out the several purposes of the disclosed subject matter. It is important, therefore, that the claims be regarded as including such equivalent constructions insofar as they do not depart from the spirit and scope of the disclosed subject matter.
  • Although the disclosed subject matter has been described and illustrated in the foregoing exemplary embodiments, it is understood that the present disclosure has been made only by way of example, and that numerous changes in the details of implementation of the disclosed subject matter may be made without departing from the spirit and scope of the disclosed subject matter, which is limited only by the claims which follow.

Claims (20)

We claim:
1. A computerized method of determining a location of a user based on locations of other users, the computerized method comprising:
receiving, at a computing device, first user location information associated with a first user from a first user device;
receiving, at the computing device, second user location information associated with a second user from a second user device, the second user being associated with second user venue information;
calculating, at the computing device, a spatial overlap metric based on a correlation between the first user location information and the second user location information;
determining, at the computing device, a venue correlation score between the first user and the second user based on the spatial overlap metric and a social metric indicating a strength of a social relationship between the first user and second user; and
creating, at the computing device, venue information for the first user based on the second user venue information when the venue correlation score exceeds a threshold value.
2. The computerized method of claim 1, wherein:
the first user location information includes first geographic coordinates and the second user location information includes second geographic coordinates, and
the correlation between the first user location information and the second user location information includes a distance between the first geographic coordinates and the second geographic coordinates.
3. The computerized method of claim 1, wherein:
the first user location information includes first user temporal information identifying a first time period in which the first user is associated with the first user location information; and
the second user location information includes second user temporal information identifying a second time period in which the second user is associated with the second user location information.
4. The computerized method of claim 3, wherein the venue correlation score is further based on a second correlation between the first user temporal information and the second user temporal information.
5. The computerized method of claim 1, wherein the venue correlation score is further based on a confidence level assigned to the second user venue information.
6. The computerized method of claim 1, wherein the social metric is defined by at least one of:
a number of times the first user is in a proximate location to the second user prior to receiving the first user location information and the second user location information;
an amount of time the first user is in the proximate location to the second user prior to receiving the first user location information and the second user location information;
a length of a relationship between the first user and the second user; or
the relationship being personal or professional.
7. The computerized method of claim 1, wherein the threshold value is based on at least one of:
a received threshold value;
a distribution of relationship scores associated with a plurality of users; or
an application of a machine learning algorithm to a plurality of user location information and user venue information.
8. A computing system for determining a location of a user based on locations of other users, the computing system comprising:
a processor; and
a memory coupled to the processor and including computer-readable instructions that, when executed by the processor, cause the processor to:
receive first user location information associated with a first user from a first user device;
receive second user location information associated with a second user from a second user device, the second user being associated with second user venue information;
calculate a spatial overlap metric based on a correlation between the first user location information and the second user location information;
determine a venue correlation score between the first user and the second user based on the spatial overlap metric and a social metric indicating a strength of a social relationship between the first user and second user; and
create venue information for the first user based on the second user venue information when the venue correlation score exceeds a threshold value.
9. The computing system of claim 8, wherein:
the first user location information includes first geographic coordinates and the second user location information includes second geographic coordinates, and
the correlation between the first user location information and the second user location information includes a distance between the first geographic coordinates and the second geographic coordinates.
10. The computing system of claim 8, wherein the computer-readable instructions further cause the processor to:
receive first temporal information associated with the first user from the first user device; and
receive second temporal information associated with the second user from the second user device.
11. The computing system of claim 10, wherein the spatial overlap metric is further based on a second correlation between the first user temporal information and the second user temporal information.
12. The computing system of claim 8, wherein the venue correlation score is further based on a confidence level assigned to the second user venue information.
13. The computing system of claim 8, wherein the social metric is defined by at least one of:
a number of times the first user is in a proximate location to the second user prior to receiving the first user location information and the second user location information;
an amount of time the first user is in the proximate location to the second user prior to receiving the first user location information and the second user location information;
a length of a relationship between the first user and the second user; or
the relationship being personal or professional.
14. The computing system of claim 8, wherein the threshold value is based on at least one of:
a received threshold value;
a distribution of relationship scores associated with a plurality of users; or
an application of a machine learning algorithm to a plurality of user location information and user venue information.
15. A non-transitory computer readable medium having stored thereon computer-executable instructions that, when executed by a computing system, cause the computing system to perform a method comprising:
receiving first user location information associated with a first user from a first user device, the first user being associated with first user venue information indicating that the first user is located at one or more of a plurality of possible first venues;
receiving second user location information associated with a second user from a second user device, the second user being associated with second user venue information indicating that the second user is located at a second venue among the plurality of possible first venues;
calculating a spatial overlap metric based on a correlation between the first user location information and the second user location information;
determining a venue correlation score between the first user and the second user based on the spatial overlap metric and a social metric indicating a strength of a social relationship between the first user and second user; and
updating the first user venue information to indicate that the first user is located at the second venue when the venue correlation score exceeds a threshold value.
16. The non-transitory computer readable medium of claim 15, wherein the plurality of possible venues are located within a radius of uncertainty corresponding to the first user location information.
17. The non-transitory computer readable medium of claim 15, wherein the first user venue information is assigned a first confidence level that is below a predetermined threshold, and the second user venue information is assigned a second confidence level that exceeds the predetermined threshold.
18. The non-transitory computer readable medium of claim 15, wherein the method further comprises receiving a user verification of the second user venue information, the user verification indicating that the second user checked in at the second venue.
19. The non-transitory computer readable medium of claim 15, wherein the method further comprises receiving a third-party verification of the second user venue information.
20. The non-transitory computer readable medium of claim 19, wherein the third-party verification is indicative of a user interaction with a third party at the second venue, the user interaction including at least one of:
the second user paying for a purchase at the second venue; or
the second user tagging a photo with the second venue.
US16/440,052 2016-08-11 2019-06-13 Geo-locating individuals based on a derived social network Active US10542105B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/440,052 US10542105B2 (en) 2016-08-11 2019-06-13 Geo-locating individuals based on a derived social network

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201662373664P 2016-08-11 2016-08-11
US15/674,778 US10264080B2 (en) 2016-08-11 2017-08-11 Geo-locating individuals based on a derived social network
US16/224,094 US10362124B2 (en) 2016-08-11 2018-12-18 Geo-locating individuals based on a derived social network
US16/440,052 US10542105B2 (en) 2016-08-11 2019-06-13 Geo-locating individuals based on a derived social network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/224,094 Continuation US10362124B2 (en) 2016-08-11 2018-12-18 Geo-locating individuals based on a derived social network

Publications (2)

Publication Number Publication Date
US20190297153A1 true US20190297153A1 (en) 2019-09-26
US10542105B2 US10542105B2 (en) 2020-01-21

Family

ID=61159574

Family Applications (3)

Application Number Title Priority Date Filing Date
US15/674,778 Active US10264080B2 (en) 2016-08-11 2017-08-11 Geo-locating individuals based on a derived social network
US16/224,094 Active US10362124B2 (en) 2016-08-11 2018-12-18 Geo-locating individuals based on a derived social network
US16/440,052 Active US10542105B2 (en) 2016-08-11 2019-06-13 Geo-locating individuals based on a derived social network

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US15/674,778 Active US10264080B2 (en) 2016-08-11 2017-08-11 Geo-locating individuals based on a derived social network
US16/224,094 Active US10362124B2 (en) 2016-08-11 2018-12-18 Geo-locating individuals based on a derived social network

Country Status (12)

Country Link
US (3) US10264080B2 (en)
EP (1) EP3497403B1 (en)
CN (1) CN109891190B (en)
DK (1) DK3497403T3 (en)
ES (1) ES2892198T3 (en)
HU (1) HUE057108T2 (en)
LT (1) LT3497403T (en)
PL (1) PL3497403T3 (en)
PT (1) PT3497403T (en)
RU (1) RU2701122C1 (en)
SI (1) SI3497403T1 (en)
WO (1) WO2018031860A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210374759A1 (en) * 2020-05-29 2021-12-02 Salesforce.Com, Inc. Physical proximity graphing

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10732297B2 (en) * 2016-08-30 2020-08-04 Faraday&Future Inc. Geo-pairing detection
CN109547924B (en) * 2018-11-26 2021-06-01 苏州达家迎信息技术有限公司 Position information sharing method, device, equipment and storage medium
US11070947B2 (en) * 2019-07-25 2021-07-20 Ford Global Technologies, Llc Distributed wireless network assisted object location
CN114219053B (en) * 2022-02-23 2023-04-18 北京淇瑀信息科技有限公司 User position information processing method and device and electronic equipment

Family Cites Families (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6275707B1 (en) * 1999-10-08 2001-08-14 Motorola, Inc. Method and apparatus for assigning location estimates from a first transceiver to a second transceiver
US9107031B2 (en) * 2000-03-13 2015-08-11 Nokia Technologies Oy Service provision in a communication system
AU2001264899A1 (en) * 2000-05-24 2001-12-03 Switchboard Incorporated Geographical comparison system and method
US6968179B1 (en) 2000-07-27 2005-11-22 Microsoft Corporation Place specific buddy list services
WO2004051580A1 (en) 2002-12-05 2004-06-17 Koninklijke Philips Electronics N.V. Transportation payment
US20090018918A1 (en) 2004-11-04 2009-01-15 Manyworlds Inc. Influence-based Social Network Advertising
US7593740B2 (en) * 2004-05-12 2009-09-22 Google, Inc. Location-based social software for mobile devices
US7231209B2 (en) * 2005-04-20 2007-06-12 Nokia Corporation Radio system, terminal device, computer program product, and method of defining availability of queried devices
WO2006128484A1 (en) * 2005-05-31 2006-12-07 Telefonaktiebolaget Lm Ericsson Positioning in a mobile communications system
US9105039B2 (en) * 2006-01-30 2015-08-11 Groupon, Inc. System and method for providing mobile alerts to members of a social network
NZ571953A (en) * 2006-03-20 2011-10-28 Riform Pty Ltd A system to determine the relationship between animals based on the time they spend close to each other
US20070225911A1 (en) 2006-03-23 2007-09-27 Rich Chanick User positional and venue information integration system and method
US9031583B2 (en) * 2007-04-11 2015-05-12 Qualcomm Incorporated Notification on mobile device based on location of other mobile device
US8923887B2 (en) * 2007-09-24 2014-12-30 Alcatel Lucent Social networking on a wireless communication system
CN102017550A (en) 2007-11-14 2011-04-13 高通股份有限公司 Methods and systems for determining a geographic user profile to determine suitability of targeted content messages based on the profile
US8024431B2 (en) * 2007-12-21 2011-09-20 Domingo Enterprises, Llc System and method for identifying transient friends
US20120047087A1 (en) 2009-03-25 2012-02-23 Waldeck Technology Llc Smart encounters
WO2010118003A2 (en) 2009-04-06 2010-10-14 Globys, Inc. Contextual targeting based upon customer occasions
GB0907361D0 (en) * 2009-04-29 2009-06-10 Lok8U Ltd A tracking and communications device
KR101626446B1 (en) * 2009-08-21 2016-06-02 삼성전자주식회사 Method and apparatus for connecting the external device
US8433334B2 (en) * 2010-01-15 2013-04-30 Apple Inc. Managing a location database for network-based positioning system
US20120066303A1 (en) * 2010-03-03 2012-03-15 Waldeck Technology, Llc Synchronized group location updates
US9681359B2 (en) 2010-03-23 2017-06-13 Amazon Technologies, Inc. Transaction completion based on geolocation arrival
JP2012015924A (en) * 2010-07-02 2012-01-19 Sony Computer Entertainment Inc Communication system, communication method, program and information storage medium
US8538389B1 (en) * 2010-07-02 2013-09-17 Mlb Advanced Media, L.P. Systems and methods for accessing content at an event
US8284748B2 (en) * 2010-07-07 2012-10-09 Apple Inc. Ad hoc formation and tracking of location-sharing groups
US8983978B2 (en) 2010-08-31 2015-03-17 Apple Inc. Location-intention context for content delivery
US9247521B2 (en) * 2010-09-01 2016-01-26 Guang Yang Localization based on individual location patterns
US8504062B2 (en) * 2010-11-01 2013-08-06 Wavemarket, Inc. System and method for aggregating and associating mobile device location data
US10438299B2 (en) 2011-03-15 2019-10-08 Visa International Service Association Systems and methods to combine transaction terminal location data and social networking check-in
US20120259791A1 (en) * 2011-04-07 2012-10-11 Sabina Zoidze System and method for social networking
US8494554B2 (en) * 2011-06-03 2013-07-23 Apple Inc. Mobile device location estimation
WO2013013161A1 (en) 2011-07-20 2013-01-24 Ebay Inc. Real-time location-aware recommendations
US8787944B2 (en) 2011-08-18 2014-07-22 Rivada Research, Llc Method and system for providing enhanced location based information for wireless handsets
US9208511B2 (en) * 2011-08-22 2015-12-08 Simple Rules, Inc. System and method for location-based recommendations
CN103891317B (en) * 2011-10-17 2017-11-28 诺基亚技术有限公司 The automated process recommended for the personalized privacy related to position
US8463295B1 (en) 2011-12-07 2013-06-11 Ebay Inc. Systems and methods for generating location-based group recommendations
US8521128B1 (en) * 2011-12-09 2013-08-27 Google Inc. Method, system, and computer program product for obtaining crowd-sourced location information
JP5855924B2 (en) * 2011-12-09 2016-02-09 桑原 雅人 Server apparatus, communication system, control method, and program
US8761797B1 (en) * 2012-02-14 2014-06-24 Google Inc. Location accuracy based on map viewport
JP5929501B2 (en) * 2012-05-21 2016-06-08 ソニー株式会社 Information processing apparatus, information processing method, and program
US9326263B2 (en) * 2012-06-13 2016-04-26 At&T Mobility Ii Llc Site location determination using crowd sourced propagation delay and location data
KR101979401B1 (en) * 2012-06-22 2019-05-16 구글 엘엘씨 Ranking nearby destinations based on visit likelihoods and predicting future visits to places from location history
US8447516B1 (en) * 2012-08-31 2013-05-21 Google Inc. Efficient proximity detection
US9338622B2 (en) 2012-10-04 2016-05-10 Bernt Erik Bjontegard Contextually intelligent communication systems and processes
JP6197372B2 (en) * 2012-10-12 2017-09-20 株式会社リコー Information processing apparatus, information processing method, and information processing program
US8738036B1 (en) * 2013-05-29 2014-05-27 Joingo, Llc Method and system for wayfinding at a venue
WO2015056269A1 (en) 2013-10-20 2015-04-23 Anagog Ltd Method, system and product for automatic parking payment and policy detection
WO2015061295A1 (en) 2013-10-22 2015-04-30 Northeastern University Flux-less direct soldering by ultrasonic surface activation
US20150156245A1 (en) * 2013-12-02 2015-06-04 Continental Automotive Gmbh Navigation and communication system for a means of transport
KR102008452B1 (en) * 2014-02-19 2019-08-07 삼성전자주식회사 Method and its apparatus for collecting information of a device
US9310205B2 (en) * 2014-02-20 2016-04-12 Stubhub, Inc. Interactive venue assistant
US9888347B1 (en) * 2014-04-17 2018-02-06 Google Inc. Resolving location criteria using user location data
US10187343B2 (en) * 2014-12-18 2019-01-22 Facebook, Inc. Location data for defining places and traffic
KR101640222B1 (en) * 2014-12-31 2016-07-15 라인 가부시키가이샤 Apparatus, method, and computer program for providing chatting service
EP3371716B8 (en) 2015-10-20 2023-08-02 Axon Vibe AG System and method for detecting interaction and influence in networks

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210374759A1 (en) * 2020-05-29 2021-12-02 Salesforce.Com, Inc. Physical proximity graphing
US11869014B2 (en) * 2020-05-29 2024-01-09 Salesforce, Inc. Physical proximity graphing

Also Published As

Publication number Publication date
EP3497403B1 (en) 2021-08-11
US20190124166A1 (en) 2019-04-25
SI3497403T1 (en) 2022-01-31
US10362124B2 (en) 2019-07-23
US10264080B2 (en) 2019-04-16
PT3497403T (en) 2021-10-04
ES2892198T3 (en) 2022-02-02
LT3497403T (en) 2021-11-25
HUE057108T2 (en) 2022-04-28
EP3497403A1 (en) 2019-06-19
RU2701122C1 (en) 2019-09-24
CN109891190B (en) 2020-12-29
US10542105B2 (en) 2020-01-21
US20180048720A1 (en) 2018-02-15
WO2018031860A1 (en) 2018-02-15
CN109891190A (en) 2019-06-14
EP3497403A4 (en) 2019-09-04
PL3497403T3 (en) 2022-01-10
ES2892198T8 (en) 2022-02-10
DK3497403T3 (en) 2021-10-04

Similar Documents

Publication Publication Date Title
US10542105B2 (en) Geo-locating individuals based on a derived social network
US10735532B2 (en) System and method for detecting interaction and influence in networks
EP3320512B1 (en) Mobile attribute time-series profiling analytics
US20220136857A1 (en) Safety-aware route recommendation system and method
US8756011B2 (en) Determining locations of interest based on user visits
Bachmann et al. Fusing a bluetooth traffic monitoring system with loop detector data for improved freeway traffic speed estimation
US8600797B1 (en) Inferring household income for users of a social networking system
US20090030778A1 (en) System, method and apparatus for secure multiparty location based services
Shi et al. ParkCrowd: Reliable crowdsensing for aggregation and dissemination of parking space information
US10067985B2 (en) Computing system with crowd-source mechanism and method of operation thereof
US20120310737A1 (en) Method for providing advertisement, computer-readable medium including program for performing the method and advertisement providing system
US11663497B2 (en) Facilitating changes to online computing environment by assessing impacts of actions using a knowledge base representation
US11778457B2 (en) Integration of content distribution systems with device detection systems in physical venues
Davies et al. Patterns in the supply and demand of urban policing at the street segment level
US20220374484A1 (en) Graph learning and automated behavior coordination platform
KR101719198B1 (en) Method for managing personal information and payment information in user terminal or device and recommendation system using the same
US9785993B2 (en) Method for analyzing and ranking venues
CN110720099A (en) System and method for providing recommendation based on seed supervised learning
WO2015184199A1 (en) Systems and methods for generating contextual insight on electronic devices
Zhang et al. Context-aware generic service discovery and service composition
US20210209622A1 (en) System and method for collecting real-world data in fulfillment of observation campaign opportunities
CN111861139A (en) Merchant recommendation method and device and computer equipment
US20230069840A1 (en) Integration of digital history with visits to physical venues
Woodburn et al. Herd Routes: A Preventative IoT-Based System for Improving Female Pedestrian Safety on City Streets
Gupta Spatial modelling of air pollution for open smart cities

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

AS Assignment

Owner name: AXON VIBE AG, SWITZERLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YOSHIDA, KATHERINE;ANNICQ, THOMAS;OBERLI, ROMAN;AND OTHERS;SIGNING DATES FROM 20170918 TO 20170919;REEL/FRAME:049722/0654

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT RECEIVED

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4